Access

If your organisation wishes to explore the system, then tell us a little about your processing and data flows, in a request for access : Send Access Request

It's not sensible for us to publish any access details for the demonstration live system because of the inevitable abuse that results. And we expect those granted access not to give the access details to others.

Access Monitoring

Note that details of all accesses to all IWAS components are logged.

Details include such things as user name, device identifier, software identifier, IP address, time.

Logs are retained for at least 3 months, and indefinitely longer as required for investigation of problems.